US20150178488A1 - Method and apparatus for eye-scan authentication using a liquid lens - Google Patents
Method and apparatus for eye-scan authentication using a liquid lens Download PDFInfo
- Publication number
- US20150178488A1 US20150178488A1 US14/635,282 US201514635282A US2015178488A1 US 20150178488 A1 US20150178488 A1 US 20150178488A1 US 201514635282 A US201514635282 A US 201514635282A US 2015178488 A1 US2015178488 A1 US 2015178488A1
- Authority
- US
- United States
- Prior art keywords
- user
- retinal image
- authentication
- endpoint device
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/40—Extraction of image or video features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G02—OPTICS
- G02B—OPTICAL ELEMENTS, SYSTEMS OR APPARATUS
- G02B3/00—Simple or compound lenses
- G02B3/12—Fluid-filled or evacuated lenses
- G02B3/14—Fluid-filled or evacuated lenses of variable focal length
-
- G—PHYSICS
- G02—OPTICS
- G02B—OPTICAL ELEMENTS, SYSTEMS OR APPARATUS
- G02B26/00—Optical devices or arrangements for the control of light using movable or deformable optical elements
- G02B26/004—Optical devices or arrangements for the control of light using movable or deformable optical elements based on a displacement or a deformation of a fluid
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/18—Eye characteristics, e.g. of the iris
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
Definitions
- the present invention relates generally to authentication and, more particularly, to a method for eye-scan authentication using a liquid lens.
- remote access and broadband services have increased the need for security verification of users who use remote devices to access various services and/or to perform transactions.
- a customer may access various multimedia services, perform banking transactions, make purchases, and so on, using a mobile device such as a laptop computer, a cell phone, a smart phone, and the like.
- a typical authentication method may simply use a password and a user login name.
- passwords and user login names can be easily compromised for many reasons. For example, the user may keep a default password, or use an easily deducible name, birthday, etc.
- Another approach for increasing security is to employ verification or authentication using biological markers such as fingerprints, and the like.
- biological markers are less likely to be compromised.
- authentications based on biological markers are typically available only on fixed stations, e.g., security devices deployed near entry doors to highly secure areas.
- the present invention discloses a method and apparatus for providing eye-scan authentication using an adaptive liquid lens.
- the method receives a request for eye-scan authentication from a mobile endpoint device of a user, wherein the request comprises a first retinal image of the user captured using an adaptive liquid lens of the mobile endpoint device.
- the method obtains a second retinal image of the user, wherein the second retinal image is a stored retinal image of the user.
- the method authenticates the first retinal image against the second retinal image.
- the method captures a first retinal image of a user via a mobile endpoint device of the user, wherein the mobile endpoint device comprises an adaptive liquid lens.
- the method then sends a request for eye-scan authentication from the mobile endpoint device over a network, wherein the request comprises the first retinal image.
- FIG. 1 illustrates an exemplary network related to the present invention
- FIG. 2 illustrates an exemplary network with one embodiment of the present invention for eye-scan authentication using a liquid lens
- FIG. 3 illustrates a flowchart of a method for eye-scan authentication using a liquid lens
- FIG. 4 illustrates a flowchart of a method for eye-scan authentication using a liquid lens in a customer endpoint device
- FIG. 5 illustrates a high-level block diagram of a general-purpose computer suitable for use in performing the functions described herein.
- the present invention broadly discloses a method and apparatus for eye-scan authentication using a liquid lens, e.g., deployed on a mobile device that is capable of communicating with a network.
- the result of the authentication can be extended beyond the mobile device and into the network, e.g., the authentication can be used to access various services over the network.
- the present invention is discussed below in the context of wireless networks, e.g., cellular networks, the present invention is not so limited. Namely, the present invention can be applied to all networks that would benefit from authentication implemented on mobile devices, e.g., laptops, mobile phones, and the like.
- FIG. 1 is a block diagram depicting an exemplary packet network 100 related to the current invention.
- Exemplary packet networks include Internet protocol (IP) networks, Internet Protocol (IP) Multimedia Subsystem (IMS) networks, Ethernet networks, and the like.
- IP Internet protocol
- IP Internet Protocol
- IMS Internet Multimedia Subsystem
- An IP network is broadly defined as a network that uses Internet Protocol e.g., IPv4 or IPv6 and the like, to exchange data packets.
- IP Multimedia Subsystem (IMS) networks include Internet protocol (IP) networks such as Voice over Internet Protocol (VoIP) networks, Service over Internet Protocol (SoIP) networks, and the like.
- IP Internet protocol
- VoIP Voice over Internet Protocol
- SoIP Service over Internet Protocol
- the packet network may comprise a plurality of endpoint devices 102 - 104 configured for communication with the core packet network 110 (e.g., an IP based core backbone network supported by a service provider) via an access network 101 .
- the core packet network 110 e.g., an IP based core backbone network supported by a service provider
- a plurality of endpoint devices 105 - 107 are configured for communication with the core packet network 110 via an access network 108 .
- the network elements 109 and 111 may serve as gateway servers or edge routers for the network 110 .
- the endpoint devices 102 - 107 may comprise customer endpoint devices such as personal computers, laptop computers, Personal Digital Assistants (PDAs), mobile phones, smart phones, servers, routers, and the like.
- the access networks 101 and 108 serve as a conduit to establish a connection between the endpoint devices 102 - 107 and the NEs 109 and 111 of the core network 110 , e.g., an IP/MPLS core network.
- the access networks 101 and 108 may each comprise a wireless network, a cellular network, a Digital Subscriber Line (DSL) network, a broadband cable access network, a Local Area Network (LAN), a Wireless Access Network (WAN), a 3 rd party network, and the like.
- the access networks 101 and 108 may be either directly connected to NEs 109 and 111 of the IP/MPLS core network 110 , or indirectly through another network.
- Some NEs reside at the edge of the core infrastructure and interface with customer endpoints over various types of access networks.
- An NE that resides at the edge of a core infrastructure is typically implemented as an edge router, a media gateway, a border element, a firewall, a switch, and the like.
- An NE may also reside within the network (e.g., NEs 118 - 120 ) and may be used as a mail server, a router, or like device.
- the IP/MPLS core network 110 also comprises an application server 112 that contains a database 115 .
- the application server 112 may comprise any server or computer that is well known in the art, and the database 115 may be any type of electronic collection of data that is also well known in the art.
- the communication system 100 can be expanded by including any number of endpoint devices, access networks, network elements, and application servers without altering the scope of the present invention.
- a service provider may enable its customers to access services from remote or mobile locations.
- a customer may authenticate his/her identity using a mobile device.
- a customer may access a network from a mobile location by entering a password along with a user identification (ID) such as a user login name.
- ID user identification
- the service provider may prefer a higher level of authentication such as using biological markers of the customers. For example, fingerprints and retinal scans may be used, which are not easily compromised.
- scanners of biological markers are typically mounted on fixed devices that are deployed locally at specific locations such as entry doors and the like.
- CCD Charge Coupled Device
- CMOS Complementary Metal Oxide Silicon
- CCD and CMOS are two popular types of image sensors for digital cameras. Similar to regular digital cameras, cell phones may be equipped with CCD or CMOS technologies with several megapixel resolutions, e.g., five megapixel resolutions.
- customers are accustomed to taking pictures using their cell phones and distributing the pictures to family and friends over a network such as the Internet.
- the current invention provides a method and apparatus for implementing eye-scan authentication using a liquid lens that is incorporated into a mobile device, e.g., a mobile phone.
- a liquid lens is a lens made from two liquids of equal density sandwiched between two windows in a conical vessel.
- the liquids may be oil and water. It should be noted that other types of liquids in addition to water and oil can be used.
- a voltage is applied across the conical structure, the shape of the interface between the oil and water changes. For example, if zero volts are applied, the shape of the interface will be flat, whereas if 40 volts are applied, the shape will be highly convex.
- the ability to manipulate the shape of the interface allows for electronic control of certain properties of the lens. For example, a far field imagine lens (a regular camera lens) can be changed to a near field imagine lens capable of taking microscopic type images which can be used for retinal scanning.
- a liquid lens can be implemented with a very small physical footprint.
- a liquid lens of a very small physical size can be implemented with a camera for thin profiled applications.
- the current method provides an eye-scan authentication using a liquid lens in a mobile device such as a mobile phone. That is, a customer's mobile phone is used as a portable eye scanner that is available to the customer at any time for authentication purposes.
- a service provider may store the customer's biometric data, e.g., retinal image of the customer, at a network location.
- biometric data e.g., retinal image of the customer
- the customer may authenticate his/her identity by taking the customer's own retinal image using the mobile phone, optionally encrypting the image as needed, and transmitting the image to the service provider for authentication.
- the customer places the mobile phone close to the customer's eye, to capture a close up image of the customer's retina. Effectively, the mobile phone is used to perform retinal scanning to capture the image of a user's retina.
- the captured image can then be encrypted and transmitted to the service provider for authenticating the customer's identity (or broadly the identity of the user operating the mobile device).
- the service provider may then receive the transmitted image and compare the image to the customer's retinal image previously stored in a database. The customer can then be allowed to access the services or make purchases if the authentication based on the retinal image is successful.
- FIG. 2 illustrates an exemplary network 200 with one embodiment of the present invention for providing eye-scan authentication using a liquid lens.
- the exemplary network 200 comprises a mobile phone 202 (e.g., a cellular phone, a smart phone and the like) communicating with a core network 110 via a wireless access network 101 .
- the core network 110 comprises an application server 212 for providing eye scan authentication and a database 215 containing stored biometric data, e.g., retina images of a plurality of customers.
- the stored biometric data was previously obtained directly from the customers, e.g., when the customers subscribed to a service provided by the service provider. For example, at the point of sale or at the point of subscription, the customer can provide the biometric data.
- the mobile phone 202 is used to take one or more images of a retina 222 , through an eye lens 221 in the eye ball 220 .
- the mobile phone 202 may comprise a CCD or CMOS array 230 , an adaptive liquid lens 231 (broadly a first optical stage), a fixed camera lens 232 (broadly a second optical stage), illuminators 233 - 234 (e.g., organized in a ring or substantially circular configuration), and a variable voltage source 235 .
- the CCD or CMOS array 230 is an image sensor used to convert light to electrons. For example, the light received through the lenses 232 and 231 converge onto the image sensor 230 .
- the image sensor 230 converts the optical signal to an electronic (e.g., analog) signal and send it to a processor 237 which may then create a digital version of the captured image.
- the current method may use a beam splitter, e.g., a LED illuminator beam splitter mirror between the primary imaging lens and the exit aperture of the scanner housing, or one or more lighting elements around the lens for flooding the retina with light, through the iris and the eye lens.
- a beam splitter e.g., a LED illuminator beam splitter mirror between the primary imaging lens and the exit aperture of the scanner housing, or one or more lighting elements around the lens for flooding the retina with light, through the iris and the eye lens.
- the illuminators 233 - 234 are used to provide illumination to the retina 222 . It should be noted that a customer may feel discomfort with the brightness of the light being used for illumination. However, the CCD and CMOS type imagers are sensitive to a wide range of wavelengths, including visible and near infrared wavelength. As such, the illuminators 233 and 234 illuminate or diffuse light in the visible or Infrared Radiation (IR) range. In one embodiment, the illuminators 233 and 234 are used to flood the retina with light through the iris and eye lens, thereby addressing a potential problem known as “red eye”, which is the unintentional illumination of the retina by a bright camera flash.
- IR Infrared Radiation
- the current method uses infrared radiation for illumination such that the retinal scan can be performed without causing discomfort due to bright lights in the visible wavelength range.
- the combination of the fixed camera lens 232 and the adaptive liquid lens 231 is used to take macroscopic images of the retina. That is, the combination of the fixed camera lens 232 and the liquid lens 231 functions as a macro lens for near field focusing.
- the variable voltage source 235 is used to ensure the image is properly focused on the CCD or CMOS array 230 . That is, the voltage source 235 is used for controlling the shape of the interface between the water and oil in the adaptive liquid lens 231 , thereby controlling the focus of the retinal image onto the CCD or CMOS array 230 . Namely, the reflected image of the retina returning back through the series of lens (i.e., the eye lens, the fixed camera lens, and the liquid lens) needs to be focused onto the CCD or CMOS array 230 .
- the two optical stage arrangement as discussed above is modified where the fixed camera lens is replaced with a second adaptive liquid lens (shown as 231 a in phantom) that would function as the primary imaging lens.
- a second adaptive liquid lens shown as 231 a in phantom
- the use of two liquid lenses rather than one may allow for a greater adaptive focus control response and less severe liquid lens curvatures in either lens stage as the full macro lens optical power requirement is shared between the two liquid lens stages.
- This alternate embodiment will also require less electrical power and thus will prolong battery life.
- the increased focus flexibility would also allow for a broad focus range for imaging applications beyond retinal scanning.
- the retinal scanning is performed by the customer using the mobile phone equipped with a liquid lens capable of taking microscopic images. Since the object (i.e., the retina) is very close by (in near field), the muscular movement of the customer, while taking the image, may cause an image smear.
- the current method uses one or more image stabilization techniques to avoid image smears.
- the current method may perform image stabilization to compensate for the image shift induced by vibrations of the mobile phone.
- the liquid lens can be used to shift the image across the imager's focal plane to compensate for the vibrations, e.g., caused by a shaking of the customer's hand.
- the image shift at the focal plane due to hand vibrations could be captured and used along with edge detection techniques such as techniques used for image sharpening. It should be noted that any image stabilization techniques and/or edge detection techniques can be used with the present invention.
- the service provider implements an authentication method based on eye-scanning in an application server 212 .
- the retinal images taken by the mobile phone 202 are sent to the application server 212 .
- the application server 212 may perform authentication of a customer by comparing a received image against a previously stored image in the database 215 .
- the customer may authenticate his/her identity by taking the customer's own retinal image using the mobile phone 202 .
- the customer transmits an authentication request to the application server 212 that comprises the retinal image.
- the application server 212 retrieves a previously stored retinal image for the customer from the database 215 . If a retinal image is successfully located for the customer, the image received in the authentication request is then compared with the image retrieved from the database 215 . If the images match, then the customer is then successfully authenticated.
- a response is then sent to the customer and the customer is then allowed to proceed with accessing a desired service.
- the service provider may perform the authentication for a third party.
- a mobile telephony service provider may perform an eye-scan authentication to certify to another third party that the user currently using the mobile phone is indeed a registered subscriber of the mobile telephony service provider.
- an online merchant may then allow the user to make online purchases knowing that the identity of the user has already been certified by the mobile telephony service provider.
- a user who is a subscriber of a cellular service provided by a cellular service provider may want to make purchases using the user's cellular phone.
- the user Prior to accessing the website of a merchant, the user will forward a retinal image via the cellular phone to the cellular service provider who will authenticate the identity of the user.
- the cellular service provider can forward the user's authentication information (e.g., an electronic authentication certificate) to any online merchants that the user will be interacting with for the purpose of making purchases.
- the authentication can be performed by a third party instead of the service provider.
- the third party can be a credit card company that has issued a credit card to the user.
- the credit card company may employ its own application server that contains stored biometric information pertaining to all the credit card holders. The credit card company can then perform eye-scan authentication before approving a transaction debited against a credit card issued by the credit card company.
- FIG. 3 illustrates a flowchart of a method 300 for providing eye-scan authentication using a liquid lens.
- one or more steps of method 300 can be implemented in an application server.
- Method 300 starts in step 305 and proceeds to step 310 .
- step 310 method 300 receives a request for eye-scan authentication from a customer endpoint device (broadly from a user of a mobile endpoint device), wherein the request comprises a first retinal image of the customer.
- the customer may be initiating a transaction that requires authentication of the identity of the customer.
- the customer takes an image of his/her retina using a mobile phone equipped with an adaptive liquid lens for near field imaging. The customer then sends the retinal image in an authentication request.
- step 320 method 300 obtains a second retinal image of the customer, wherein the second retinal image is a previously stored retinal image of the customer.
- the service provider has previously stored customer biometric data, including retinal images, in a database.
- the method may then retrieve the customer's retinal image previously stored in the database.
- step 330 method 300 determines if the second retinal image is found for the customer. If the second retinal image (e.g., a previously stored retinal image) for that customer is found, the method proceeds to step 340 . Otherwise, method 300 proceeds to step 380 .
- the second retinal image e.g., a previously stored retinal image
- step 340 method 300 authenticates the first retinal image against the second retinal image. For example, the method compares the retinal image received in the authentication request with the previously stored retinal image obtained from the database in order to determine if the request is originated by the customer or another person using the endpoint device, e.g., the cell phone.
- the endpoint device e.g., the cell phone.
- step 350 method 300 determines if the authentication is successful. For example, the method may determine that the first and the second retinal images are images of the same eye. In another example, the method may determine that the first retinal image is not that of the customer. For example, the cell phone has been compromised and another person may be attempting to initiate an unauthorized transaction and/or communication with the application server. If the authentication is successful, the method proceeds to step 360 . Otherwise, the method proceeds to step 370 .
- step 360 method 300 provides the requested authentication (broadly a positive response indicating that the requested authentication has succeeded), e.g., a positive response indicative of a successful authentication, an electronic authentication certificate, a positive response to allow the user to access a requested service, a positive response to allow the user to perform a transaction, and the like.
- the method enables the customer to access one or more services that can be accessed only upon a successful authentication of the identity of the customer.
- the authentication can be performed for another third party as discussed above, where the authentication information can further be forwarded to the third party.
- the authentication is performed by a third party as discussed above.
- the method then proceeds to step 390 to end processing the current request or returns to step 310 to receive another request.
- step 370 method 300 denies the requested authentication (broadly a negative response indicating that the requested authentication has failed). For example, the method prevents the individual from accessing services (or making purchases) that may be accessed only upon a successful authentication of the identity of the requestor. For example, another individual may be using the customer's cell phone and attempting to access unauthorized services. The method then proceeds to step 390 to end processing the current request or returns to step 310 to receive another request.
- step 380 method 300 notifies the customer that a stored image necessary for authentication is not found. For example, the customer may not have stored a retinal image when the customer activated the service. The customer is then notified that the authentication is not possible due to the lack of a previously stored retinal image. The method then proceeds to step 390 to end processing the current request or returns to step 310 to receive another request.
- FIG. 4 illustrates a flowchart of a method 400 for eye-scan authentication using a liquid lens in a customer endpoint device.
- a mobile endpoint device e.g., a mobile phone.
- Method 400 starts in step 405 and proceeds to step 410 .
- step 410 method 400 takes or captures a retinal image of a customer using a mobile endpoint device that comprises an adaptive liquid lens and a fixed camera lens, wherein the adaptive liquid lens and the fixed camera lens perform near field imaging.
- the combination of the adaptive liquid lens and a fixed camera lens may function as a macro lens such that the combination can be used for close up images and accurate focusing of the resulting image on a CCD or CMOS array within the mobile endpoint device.
- step 420 method 400 sends an authentication request that comprises the retinal image of the customer (broadly a user of the mobile endpoint device).
- the customer may send an authentication request to a network service provider that includes the retinal image taken by a mobile endpoint device, e.g., the cell phone as discussed above.
- step 430 method 400 receives a response for the authentication request.
- the method may receive a response that indicates the retinal image successfully matched a previously stored retinal image of the customer.
- step 440 method 400 determines if the authentication request was successful. If the request is denied, the method proceeds to step 460 to end the current request or returns to step 410 to take another retinal image.
- the captured image of the retina may be flawed for various reasons, e.g., the mobile endpoint device was misaligned with the user's eye, the image was slightly out of focus, the surrounding lightings caused unexpected distortions, and so on. Thus, the user may attempt to provide another image of the retina for authentication. If the request is successful, the method proceeds to step 450 .
- step 450 the method accesses a desired service and returns to step 410 , if it is sending another request.
- the method may perform a transaction such as making a purchase.
- the above method for eye-scan authentication can be adopted for authentication in other localized applications.
- the authentication can be used to gain access to a local device.
- the retinal image of the customer can be stored locally within the mobile endpoint device, e.g., in the cell phone's memory, smart card, etc.
- the customer can then proceed with a transaction only after authenticating the identity of the user via a retinal scan, where the authentication is performed locally within the mobile endpoint device.
- a user is able to selectively implement various levels or varying degrees of security for the mobile endpoint device.
- a user may only implement the use of a simple password to use the mobile phone, but the user may require that a higher level of security for making purchases using the mobile phone.
- one or more steps of methods 300 and 400 may include a storing, displaying and/or outputting step as required for a particular application.
- any data, records, fields, and/or intermediate results discussed in the method can be stored, displayed and/or outputted to another device as required for a particular application.
- steps or blocks in FIG. 3 and FIG. 4 that recite a determining operation or involve a decision do not necessarily require that both branches of the determining operation be practiced. In other words, one of the branches of the determining operation can be deemed as an optional step.
- the transfer of the captured retinal data between the mobile device and a receiver can be achieved via a direct peer to peer communication, e.g., via radio communication such as a Wi-Fi link and the like, or a physical cable, e.g., a Universal Serial Bus (USB) cable, a FireWire and the like.
- a direct peer to peer communication is the benefit of not having to access a large network, such a cellular network to transmit the captured retinal data. For example, a user may visit a local establishment such as a local bank or a local coffee house on a regular basis.
- the user can simply transmit the captured retinal data via direct peer to peer communication between the user's mobile device and a receiver deployed at the local establishment that has a server that has previously stored a copy of the user's captured retinal image.
- the local establishment can then perform retinal scan authentication locally without having to access any external network. This will increase the speed of authentication.
- the mobile endpoint device may employ a centering mechanism for providing a stable optical axis.
- a centering mechanism for providing a stable optical axis.
- mechanical structures can be deployed to ensure precise alignment of all the lenses as discussed above.
- Any number of centering mechanisms can be used with the present invention, e.g., a marker located on the mobile device or dynamically generated by the mobile device that a user looks at when taking an image of the retina, a mechanical attachment (e.g., a funnel like structure) that a user couples to the mobile endpoint device, and so on.
- additional image processing can be employed.
- image sharpening techniques could be employed automatically to sharpen, if necessary, the peripheral field of view of the relayed images of the retina's steeply curved surface onto the flat surface of the CMOS/CCD imager's surface.
- the mobile endpoint device may comprise various user interfaces for facilitating eye-scan authentication.
- a user interface may include a physical button or key on the mobile endpoint device for selecting a retinal scan feature.
- the mobile endpoint device may comprise a display where an icon representing eye-scan authentication is presented to the user.
- the user will place the camera close to the user's eye and fixate the eye on the camera lens.
- a camera and illumination control system e.g., a software and/or hardware system
- the camera may then perform the retina scan and capture the desired image.
- FIG. 5 depicts a high-level block diagram of a general-purpose computer suitable for use in performing the functions described herein.
- the system 500 comprises a processor element 502 (e.g., a CPU), a memory 504 , e.g., random access memory (RAM) and/or read only memory (ROM), a module 505 for providing eye-scan authentication using a liquid lens, and various input/output devices 506 (e.g., storage devices, including but not limited to, a tape drive, a floppy drive, a hard disk drive or a compact disk drive, a receiver, a transmitter, a speaker, a display, a speech synthesizer, an output port, and a user input device (such as a keyboard, a keypad, a mouse, alarm interfaces, power relays and the like)).
- a processor element 502 e.g., a CPU
- memory 504 e.g., random access memory (RAM) and/or read only memory (ROM)
- the present invention can be implemented in software and/or in a combination of software and hardware, e.g., using application specific integrated circuits (ASIC), a general-purpose computer or any other hardware equivalents.
- the present module or process 505 for providing eye-scan authentication using a liquid lens can be loaded into memory 504 and executed by processor 502 to implement the functions as discussed above.
- the present method 505 for providing eye-scan authentication using a liquid lens (including associated data structures) of the present invention can be stored on a computer readable storage medium, e.g., RAM memory, magnetic or optical drive or diskette and the like.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Optics & Photonics (AREA)
- Accounting & Taxation (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Biomedical Technology (AREA)
- Computing Systems (AREA)
- Multimedia (AREA)
- Finance (AREA)
- Software Systems (AREA)
- Ophthalmology & Optometry (AREA)
- Telephonic Communication Services (AREA)
- Image Input (AREA)
- Collating Specific Patterns (AREA)
- Mobile Radio Communication Systems (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
- Telephone Function (AREA)
- Studio Devices (AREA)
Abstract
A method and apparatus for providing authentication using an adaptive liquid lens are disclosed. For example, in one embodiment, the method receives a request for authentication from a mobile endpoint device of a user, wherein the request comprises a first retinal image of the user captured using an adaptive liquid lens of the mobile endpoint device. The method obtains a second retinal image of the user, wherein the second retinal image is a stored retinal image of the user. The method authenticates the first retinal image against the second retinal image. In another embodiment, the method captures a first retinal image of a user via a mobile endpoint device of the user, wherein the mobile endpoint device comprises an adaptive liquid lens. The method then sends a request for authentication from the mobile endpoint device over a network, wherein the request comprises the first retinal image.
Description
- This application is a continuation of U.S. patent application Ser. No. 14/283,061, filed May 20, 2014, now U.S. Pat. No. 8,971,590, which is a continuation of Ser. No. 13/691,433, filed Nov. 30, 2012, now U.S. Pat. No. 8,750,577, which is a continuation U.S. patent application Ser. No. 13/561,969, filed Jul. 30, 2012, now U.S. Pat. No. 8,369,584, which is a continuation of U.S. patent application Ser. No. 12/605,180, filed Oct. 23, 2009, now U.S. Pat. No. 8,233,673, all of which are incorporated herein by reference in their entirety.
- The present invention relates generally to authentication and, more particularly, to a method for eye-scan authentication using a liquid lens.
- The increasing utilization of remote access and broadband services has increased the need for security verification of users who use remote devices to access various services and/or to perform transactions. For example, a customer may access various multimedia services, perform banking transactions, make purchases, and so on, using a mobile device such as a laptop computer, a cell phone, a smart phone, and the like. A typical authentication method may simply use a password and a user login name. Unfortunately, passwords and user login names can be easily compromised for many reasons. For example, the user may keep a default password, or use an easily deducible name, birthday, etc.
- Another approach for increasing security is to employ verification or authentication using biological markers such as fingerprints, and the like. Biological markers are less likely to be compromised. However, authentications based on biological markers are typically available only on fixed stations, e.g., security devices deployed near entry doors to highly secure areas.
- In one embodiment, the present invention discloses a method and apparatus for providing eye-scan authentication using an adaptive liquid lens. For example, the method receives a request for eye-scan authentication from a mobile endpoint device of a user, wherein the request comprises a first retinal image of the user captured using an adaptive liquid lens of the mobile endpoint device. The method obtains a second retinal image of the user, wherein the second retinal image is a stored retinal image of the user. The method authenticates the first retinal image against the second retinal image.
- In another embodiment, the method captures a first retinal image of a user via a mobile endpoint device of the user, wherein the mobile endpoint device comprises an adaptive liquid lens. The method then sends a request for eye-scan authentication from the mobile endpoint device over a network, wherein the request comprises the first retinal image.
- The teaching of the present invention can be readily understood by considering the following detailed description in conjunction with the accompanying drawings, in which:
-
FIG. 1 illustrates an exemplary network related to the present invention; -
FIG. 2 illustrates an exemplary network with one embodiment of the present invention for eye-scan authentication using a liquid lens; -
FIG. 3 illustrates a flowchart of a method for eye-scan authentication using a liquid lens; -
FIG. 4 illustrates a flowchart of a method for eye-scan authentication using a liquid lens in a customer endpoint device; and -
FIG. 5 illustrates a high-level block diagram of a general-purpose computer suitable for use in performing the functions described herein. - To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures.
- The present invention broadly discloses a method and apparatus for eye-scan authentication using a liquid lens, e.g., deployed on a mobile device that is capable of communicating with a network. In turn, the result of the authentication can be extended beyond the mobile device and into the network, e.g., the authentication can be used to access various services over the network. Although the present invention is discussed below in the context of wireless networks, e.g., cellular networks, the present invention is not so limited. Namely, the present invention can be applied to all networks that would benefit from authentication implemented on mobile devices, e.g., laptops, mobile phones, and the like.
-
FIG. 1 is a block diagram depicting anexemplary packet network 100 related to the current invention. Exemplary packet networks include Internet protocol (IP) networks, Internet Protocol (IP) Multimedia Subsystem (IMS) networks, Ethernet networks, and the like. An IP network is broadly defined as a network that uses Internet Protocol e.g., IPv4 or IPv6 and the like, to exchange data packets. Exemplary IP Multimedia Subsystem (IMS) networks include Internet protocol (IP) networks such as Voice over Internet Protocol (VoIP) networks, Service over Internet Protocol (SoIP) networks, and the like. - In one embodiment, the packet network may comprise a plurality of endpoint devices 102-104 configured for communication with the core packet network 110 (e.g., an IP based core backbone network supported by a service provider) via an
access network 101. Similarly, a plurality of endpoint devices 105-107 are configured for communication with thecore packet network 110 via anaccess network 108. Thenetwork elements network 110. - The endpoint devices 102-107 may comprise customer endpoint devices such as personal computers, laptop computers, Personal Digital Assistants (PDAs), mobile phones, smart phones, servers, routers, and the like. The
access networks core network 110, e.g., an IP/MPLS core network. Theaccess networks access networks NEs MPLS core network 110, or indirectly through another network. - Some NEs (e.g., NEs 109 and 111) reside at the edge of the core infrastructure and interface with customer endpoints over various types of access networks. An NE that resides at the edge of a core infrastructure is typically implemented as an edge router, a media gateway, a border element, a firewall, a switch, and the like. An NE may also reside within the network (e.g., NEs 118-120) and may be used as a mail server, a router, or like device. The IP/
MPLS core network 110 also comprises anapplication server 112 that contains adatabase 115. Theapplication server 112 may comprise any server or computer that is well known in the art, and thedatabase 115 may be any type of electronic collection of data that is also well known in the art. Those skilled in the art will realize that although only six endpoint devices, two access networks, and one application server, are depicted inFIG. 1 , thecommunication system 100 can be expanded by including any number of endpoint devices, access networks, network elements, and application servers without altering the scope of the present invention. - The above communication network is described to only provide an illustrative environment in which packets are transmitted on networks. In one embodiment, a service provider (or a third party merchant) may enable its customers to access services from remote or mobile locations. In turn, a customer may authenticate his/her identity using a mobile device. For example, a customer may access a network from a mobile location by entering a password along with a user identification (ID) such as a user login name. However, if the password and user ID are compromised, it may be used by another individual to gain unauthorized access or to make unauthorized purchases. Thus, the service provider may prefer a higher level of authentication such as using biological markers of the customers. For example, fingerprints and retinal scans may be used, which are not easily compromised. However, scanners of biological markers are typically mounted on fixed devices that are deployed locally at specific locations such as entry doors and the like.
- However, images may be captured using mobile phones with Charge Coupled Device (CCD) or Complementary Metal Oxide Silicon (CMOS) technologies. CCD and CMOS are two popular types of image sensors for digital cameras. Similar to regular digital cameras, cell phones may be equipped with CCD or CMOS technologies with several megapixel resolutions, e.g., five megapixel resolutions. Currently, customers are accustomed to taking pictures using their cell phones and distributing the pictures to family and friends over a network such as the Internet.
- In one embodiment, the current invention provides a method and apparatus for implementing eye-scan authentication using a liquid lens that is incorporated into a mobile device, e.g., a mobile phone. A liquid lens is a lens made from two liquids of equal density sandwiched between two windows in a conical vessel. For example, the liquids may be oil and water. It should be noted that other types of liquids in addition to water and oil can be used. If a voltage is applied across the conical structure, the shape of the interface between the oil and water changes. For example, if zero volts are applied, the shape of the interface will be flat, whereas if 40 volts are applied, the shape will be highly convex. The ability to manipulate the shape of the interface allows for electronic control of certain properties of the lens. For example, a far field imagine lens (a regular camera lens) can be changed to a near field imagine lens capable of taking microscopic type images which can be used for retinal scanning.
- In addition, unlike a traditional microscopic lens, a liquid lens can be implemented with a very small physical footprint. For example, a liquid lens of a very small physical size can be implemented with a camera for thin profiled applications.
- In one embodiment, the current method provides an eye-scan authentication using a liquid lens in a mobile device such as a mobile phone. That is, a customer's mobile phone is used as a portable eye scanner that is available to the customer at any time for authentication purposes.
- For example, a service provider (or a third party, e.g., a merchant, or a credit card company) may store the customer's biometric data, e.g., retinal image of the customer, at a network location. When a customer accesses a service or makes a purchase, the customer may authenticate his/her identity by taking the customer's own retinal image using the mobile phone, optionally encrypting the image as needed, and transmitting the image to the service provider for authentication. For example, the customer places the mobile phone close to the customer's eye, to capture a close up image of the customer's retina. Effectively, the mobile phone is used to perform retinal scanning to capture the image of a user's retina. The captured image can then be encrypted and transmitted to the service provider for authenticating the customer's identity (or broadly the identity of the user operating the mobile device).
- The service provider may then receive the transmitted image and compare the image to the customer's retinal image previously stored in a database. The customer can then be allowed to access the services or make purchases if the authentication based on the retinal image is successful.
-
FIG. 2 illustrates anexemplary network 200 with one embodiment of the present invention for providing eye-scan authentication using a liquid lens. Theexemplary network 200 comprises a mobile phone 202 (e.g., a cellular phone, a smart phone and the like) communicating with acore network 110 via awireless access network 101. In one embodiment, thecore network 110 comprises anapplication server 212 for providing eye scan authentication and adatabase 215 containing stored biometric data, e.g., retina images of a plurality of customers. The stored biometric data was previously obtained directly from the customers, e.g., when the customers subscribed to a service provided by the service provider. For example, at the point of sale or at the point of subscription, the customer can provide the biometric data. - In one embodiment, the
mobile phone 202 is used to take one or more images of aretina 222, through aneye lens 221 in theeye ball 220. Themobile phone 202 may comprise a CCD orCMOS array 230, an adaptive liquid lens 231 (broadly a first optical stage), a fixed camera lens 232 (broadly a second optical stage), illuminators 233-234 (e.g., organized in a ring or substantially circular configuration), and avariable voltage source 235. - The CCD or
CMOS array 230 is an image sensor used to convert light to electrons. For example, the light received through thelenses image sensor 230. Theimage sensor 230 converts the optical signal to an electronic (e.g., analog) signal and send it to aprocessor 237 which may then create a digital version of the captured image. - The above retina scanning requires illumination of the retina. However, the retina is highly reflective and the retinal scan requires suitable illumination. For example, the current method may use a beam splitter, e.g., a LED illuminator beam splitter mirror between the primary imaging lens and the exit aperture of the scanner housing, or one or more lighting elements around the lens for flooding the retina with light, through the iris and the eye lens.
- More specifically, in one embodiment, the illuminators 233-234 are used to provide illumination to the
retina 222. It should be noted that a customer may feel discomfort with the brightness of the light being used for illumination. However, the CCD and CMOS type imagers are sensitive to a wide range of wavelengths, including visible and near infrared wavelength. As such, theilluminators 233 and 234 illuminate or diffuse light in the visible or Infrared Radiation (IR) range. In one embodiment, theilluminators 233 and 234 are used to flood the retina with light through the iris and eye lens, thereby addressing a potential problem known as “red eye”, which is the unintentional illumination of the retina by a bright camera flash. By using proper illumination via theilluminators 233 and 234, e.g., IR illumination or near IR illumination, the user will be relieved from the discomfort of dealing with a bright flash. In other words, in one embodiment, the current method uses infrared radiation for illumination such that the retinal scan can be performed without causing discomfort due to bright lights in the visible wavelength range. - The combination of the fixed
camera lens 232 and the adaptiveliquid lens 231 is used to take macroscopic images of the retina. That is, the combination of the fixedcamera lens 232 and theliquid lens 231 functions as a macro lens for near field focusing. In one embodiment, thevariable voltage source 235 is used to ensure the image is properly focused on the CCD orCMOS array 230. That is, thevoltage source 235 is used for controlling the shape of the interface between the water and oil in the adaptiveliquid lens 231, thereby controlling the focus of the retinal image onto the CCD orCMOS array 230. Namely, the reflected image of the retina returning back through the series of lens (i.e., the eye lens, the fixed camera lens, and the liquid lens) needs to be focused onto the CCD orCMOS array 230. - In one alternate embodiment, the two optical stage arrangement as discussed above is modified where the fixed camera lens is replaced with a second adaptive liquid lens (shown as 231 a in phantom) that would function as the primary imaging lens. The use of two liquid lenses rather than one may allow for a greater adaptive focus control response and less severe liquid lens curvatures in either lens stage as the full macro lens optical power requirement is shared between the two liquid lens stages. This alternate embodiment will also require less electrical power and thus will prolong battery life. Furthermore, the increased focus flexibility would also allow for a broad focus range for imaging applications beyond retinal scanning.
- As discussed above, in one embodiment, the retinal scanning is performed by the customer using the mobile phone equipped with a liquid lens capable of taking microscopic images. Since the object (i.e., the retina) is very close by (in near field), the muscular movement of the customer, while taking the image, may cause an image smear. In one embodiment, the current method uses one or more image stabilization techniques to avoid image smears. For example, the current method may perform image stabilization to compensate for the image shift induced by vibrations of the mobile phone. For example, the liquid lens can be used to shift the image across the imager's focal plane to compensate for the vibrations, e.g., caused by a shaking of the customer's hand. In another embodiment, the image shift at the focal plane due to hand vibrations could be captured and used along with edge detection techniques such as techniques used for image sharpening. It should be noted that any image stabilization techniques and/or edge detection techniques can be used with the present invention.
- In one embodiment, the service provider implements an authentication method based on eye-scanning in an
application server 212. For example, the retinal images taken by themobile phone 202 are sent to theapplication server 212. Theapplication server 212 may perform authentication of a customer by comparing a received image against a previously stored image in thedatabase 215. - In one embodiment, when the customer accesses a service that requires eye-scan authentication, the customer may authenticate his/her identity by taking the customer's own retinal image using the
mobile phone 202. The customer then transmits an authentication request to theapplication server 212 that comprises the retinal image. Theapplication server 212 retrieves a previously stored retinal image for the customer from thedatabase 215. If a retinal image is successfully located for the customer, the image received in the authentication request is then compared with the image retrieved from thedatabase 215. If the images match, then the customer is then successfully authenticated. A response is then sent to the customer and the customer is then allowed to proceed with accessing a desired service. - Alternatively, the service provider may perform the authentication for a third party. For example, a mobile telephony service provider may perform an eye-scan authentication to certify to another third party that the user currently using the mobile phone is indeed a registered subscriber of the mobile telephony service provider. In doing so, an online merchant may then allow the user to make online purchases knowing that the identity of the user has already been certified by the mobile telephony service provider. To illustrate, a user who is a subscriber of a cellular service provided by a cellular service provider may want to make purchases using the user's cellular phone. Prior to accessing the website of a merchant, the user will forward a retinal image via the cellular phone to the cellular service provider who will authenticate the identity of the user. Once the user is authenticated, the cellular service provider can forward the user's authentication information (e.g., an electronic authentication certificate) to any online merchants that the user will be interacting with for the purpose of making purchases.
- Alternatively, it should be noted that the authentication can be performed by a third party instead of the service provider. For example, the third party can be a credit card company that has issued a credit card to the user. In doing so, the credit card company may employ its own application server that contains stored biometric information pertaining to all the credit card holders. The credit card company can then perform eye-scan authentication before approving a transaction debited against a credit card issued by the credit card company.
-
FIG. 3 illustrates a flowchart of amethod 300 for providing eye-scan authentication using a liquid lens. In one embodiment, one or more steps ofmethod 300 can be implemented in an application server.Method 300 starts instep 305 and proceeds to step 310. - In
step 310,method 300 receives a request for eye-scan authentication from a customer endpoint device (broadly from a user of a mobile endpoint device), wherein the request comprises a first retinal image of the customer. For example, the customer may be initiating a transaction that requires authentication of the identity of the customer. For example, the customer takes an image of his/her retina using a mobile phone equipped with an adaptive liquid lens for near field imaging. The customer then sends the retinal image in an authentication request. - In
step 320,method 300 obtains a second retinal image of the customer, wherein the second retinal image is a previously stored retinal image of the customer. For example, the service provider has previously stored customer biometric data, including retinal images, in a database. The method may then retrieve the customer's retinal image previously stored in the database. - In
step 330,method 300 determines if the second retinal image is found for the customer. If the second retinal image (e.g., a previously stored retinal image) for that customer is found, the method proceeds to step 340. Otherwise,method 300 proceeds to step 380. - In
step 340,method 300 authenticates the first retinal image against the second retinal image. For example, the method compares the retinal image received in the authentication request with the previously stored retinal image obtained from the database in order to determine if the request is originated by the customer or another person using the endpoint device, e.g., the cell phone. - In
step 350,method 300 determines if the authentication is successful. For example, the method may determine that the first and the second retinal images are images of the same eye. In another example, the method may determine that the first retinal image is not that of the customer. For example, the cell phone has been compromised and another person may be attempting to initiate an unauthorized transaction and/or communication with the application server. If the authentication is successful, the method proceeds to step 360. Otherwise, the method proceeds to step 370. - In
step 360,method 300 provides the requested authentication (broadly a positive response indicating that the requested authentication has succeeded), e.g., a positive response indicative of a successful authentication, an electronic authentication certificate, a positive response to allow the user to access a requested service, a positive response to allow the user to perform a transaction, and the like. It should be noted that any format of providing the requested authentication is contemplated by the present invention. For example, the method enables the customer to access one or more services that can be accessed only upon a successful authentication of the identity of the customer. Alternatively, the authentication can be performed for another third party as discussed above, where the authentication information can further be forwarded to the third party. In yet another alternate embodiment, the authentication is performed by a third party as discussed above. The method then proceeds to step 390 to end processing the current request or returns to step 310 to receive another request. - In
step 370,method 300 denies the requested authentication (broadly a negative response indicating that the requested authentication has failed). For example, the method prevents the individual from accessing services (or making purchases) that may be accessed only upon a successful authentication of the identity of the requestor. For example, another individual may be using the customer's cell phone and attempting to access unauthorized services. The method then proceeds to step 390 to end processing the current request or returns to step 310 to receive another request. - In
step 380,method 300 notifies the customer that a stored image necessary for authentication is not found. For example, the customer may not have stored a retinal image when the customer activated the service. The customer is then notified that the authentication is not possible due to the lack of a previously stored retinal image. The method then proceeds to step 390 to end processing the current request or returns to step 310 to receive another request. -
FIG. 4 illustrates a flowchart of amethod 400 for eye-scan authentication using a liquid lens in a customer endpoint device. For example, one or more steps ofmethod 400 can be implemented in a mobile endpoint device, e.g., a mobile phone.Method 400 starts instep 405 and proceeds to step 410. - In
step 410,method 400 takes or captures a retinal image of a customer using a mobile endpoint device that comprises an adaptive liquid lens and a fixed camera lens, wherein the adaptive liquid lens and the fixed camera lens perform near field imaging. For example, the combination of the adaptive liquid lens and a fixed camera lens may function as a macro lens such that the combination can be used for close up images and accurate focusing of the resulting image on a CCD or CMOS array within the mobile endpoint device. - In
step 420,method 400 sends an authentication request that comprises the retinal image of the customer (broadly a user of the mobile endpoint device). For example, the customer may send an authentication request to a network service provider that includes the retinal image taken by a mobile endpoint device, e.g., the cell phone as discussed above. - In
step 430,method 400 receives a response for the authentication request. For example, the method may receive a response that indicates the retinal image successfully matched a previously stored retinal image of the customer. - In
step 440,method 400 determines if the authentication request was successful. If the request is denied, the method proceeds to step 460 to end the current request or returns to step 410 to take another retinal image. For example, the captured image of the retina may be flawed for various reasons, e.g., the mobile endpoint device was misaligned with the user's eye, the image was slightly out of focus, the surrounding lightings caused unexpected distortions, and so on. Thus, the user may attempt to provide another image of the retina for authentication. If the request is successful, the method proceeds to step 450. - In
step 450, the method accesses a desired service and returns to step 410, if it is sending another request. Alternatively, the method may perform a transaction such as making a purchase. - In one embodiment, the above method for eye-scan authentication can be adopted for authentication in other localized applications. For example, the authentication can be used to gain access to a local device. To illustrate, the retinal image of the customer can be stored locally within the mobile endpoint device, e.g., in the cell phone's memory, smart card, etc. The customer can then proceed with a transaction only after authenticating the identity of the user via a retinal scan, where the authentication is performed locally within the mobile endpoint device. Thus, a user is able to selectively implement various levels or varying degrees of security for the mobile endpoint device. Thus, a user may only implement the use of a simple password to use the mobile phone, but the user may require that a higher level of security for making purchases using the mobile phone. This approach allows the user to secure his or her mobile phone in the event of loss, without the inconvenience of having to provide biometric data for the simple use of the mobile endpoint device in making telephony calls. Hence, the ability to perform biometric authentication using a mobile endpoint device can be useful for various applications.
- It should be noted that although not specifically specified, one or more steps of
methods FIG. 3 andFIG. 4 that recite a determining operation or involve a decision, do not necessarily require that both branches of the determining operation be practiced. In other words, one of the branches of the determining operation can be deemed as an optional step. - In one embodiment, with the availability of dual-mode mobile phones (e.g., mobile phones that can utilize both cellular and Wi-Fi radio frequencies), the transfer of the captured retinal data between the mobile device and a receiver can be achieved via a direct peer to peer communication, e.g., via radio communication such as a Wi-Fi link and the like, or a physical cable, e.g., a Universal Serial Bus (USB) cable, a FireWire and the like. One advantage of direct peer to peer communication is the benefit of not having to access a large network, such a cellular network to transmit the captured retinal data. For example, a user may visit a local establishment such as a local bank or a local coffee house on a regular basis. The user can simply transmit the captured retinal data via direct peer to peer communication between the user's mobile device and a receiver deployed at the local establishment that has a server that has previously stored a copy of the user's captured retinal image. The local establishment can then perform retinal scan authentication locally without having to access any external network. This will increase the speed of authentication.
- In one embodiment, the mobile endpoint device may employ a centering mechanism for providing a stable optical axis. For example, mechanical structures can be deployed to ensure precise alignment of all the lenses as discussed above. Any number of centering mechanisms can be used with the present invention, e.g., a marker located on the mobile device or dynamically generated by the mobile device that a user looks at when taking an image of the retina, a mechanical attachment (e.g., a funnel like structure) that a user couples to the mobile endpoint device, and so on.
- In one embodiment, additional image processing can be employed. For example, image sharpening techniques could be employed automatically to sharpen, if necessary, the peripheral field of view of the relayed images of the retina's steeply curved surface onto the flat surface of the CMOS/CCD imager's surface.
- It should be noted that the mobile endpoint device may comprise various user interfaces for facilitating eye-scan authentication. For example, a user interface may include a physical button or key on the mobile endpoint device for selecting a retinal scan feature. Alternatively, the mobile endpoint device may comprise a display where an icon representing eye-scan authentication is presented to the user. Once selected, the user will place the camera close to the user's eye and fixate the eye on the camera lens. In turn, a camera and illumination control system (e.g., a software and/or hardware system) will perform the necessary adjustments such as auto focus and any other image capturing adjustments. The camera may then perform the retina scan and capture the desired image.
-
FIG. 5 depicts a high-level block diagram of a general-purpose computer suitable for use in performing the functions described herein. As depicted inFIG. 5 , thesystem 500 comprises a processor element 502 (e.g., a CPU), amemory 504, e.g., random access memory (RAM) and/or read only memory (ROM), amodule 505 for providing eye-scan authentication using a liquid lens, and various input/output devices 506 (e.g., storage devices, including but not limited to, a tape drive, a floppy drive, a hard disk drive or a compact disk drive, a receiver, a transmitter, a speaker, a display, a speech synthesizer, an output port, and a user input device (such as a keyboard, a keypad, a mouse, alarm interfaces, power relays and the like)). - It should be noted that the present invention can be implemented in software and/or in a combination of software and hardware, e.g., using application specific integrated circuits (ASIC), a general-purpose computer or any other hardware equivalents. In one embodiment, the present module or
process 505 for providing eye-scan authentication using a liquid lens can be loaded intomemory 504 and executed byprocessor 502 to implement the functions as discussed above. As such, thepresent method 505 for providing eye-scan authentication using a liquid lens (including associated data structures) of the present invention can be stored on a computer readable storage medium, e.g., RAM memory, magnetic or optical drive or diskette and the like. - While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
Claims (20)
1. A system for authenticating a first retinal image, comprising:
a processor of a credit card company; and
a computer-readable medium storing a plurality of instructions which, when executed by the processor, cause the processor to perform operations, the operations comprising:
receiving a request for authentication from a mobile endpoint device of a user over a network, wherein the request comprises the first retinal image of the user captured using an adaptive liquid lens and a second lens of the mobile endpoint device, wherein the first retinal image of the user comprises a near-field image;
obtaining a second retinal image of the user, wherein the second retinal image is a stored retinal image of the user;
authenticating the first retinal image against the second retinal image; and
forwarding authentication information of the user to a third party merchant.
2. The system of claim 1 , wherein the operations further comprise:
providing a positive response to the mobile endpoint device when the request for authentication is successful; and
providing a negative response to the mobile endpoint device when the request for authentication has failed.
3. The system of claim 1 , wherein the second lens comprises a fixed camera lens, wherein the adaptive liquid lens and the fixed camera lens are used to perform near field imaging.
4. The system of claim 1 , wherein the mobile endpoint device comprises a mobile phone.
5. The system of claim 4 , wherein the user is a subscriber of a network service provided by a service provider of the network.
6. The system of claim 5 , wherein the authenticating is performed by the service provider.
7. The system of claim 1 , wherein the authenticating is performed by a third party.
8. The system of claim 1 , wherein the mobile endpoint device uses infrared radiation for illumination of a retina of the user in capturing the first retinal image.
9. A tangible computer-readable storage medium storing a plurality of instructions which, when executed by a processor of a credit card company, cause the processor to perform operations for authenticating a first retinal image, the operations comprising:
receiving, by the credit card company, a request for authentication from a mobile endpoint device of a user over a network, wherein the request comprises the first retinal image of the user captured using an adaptive liquid lens and a second lens of the mobile endpoint device, wherein the first retinal image of the user comprises a near-field image;
obtaining a second retinal image of the user, wherein the second retinal image is a stored retinal image of the user;
authenticating the first retinal image against the second retinal image; and
forwarding authentication information of the user to a third party merchant.
10. The tangible computer-readable storage medium of claim 9 , wherein the operations further comprise:
providing a positive response to the mobile endpoint device when the request for authentication is successful; and
providing a negative response to the mobile endpoint device when the request for authentication has failed.
11. The tangible computer-readable storage medium of claim 9 , wherein the second lens comprises a fixed camera lens, wherein the adaptive liquid lens and the fixed camera lens are used to perform near field imaging.
12. The tangible computer-readable storage medium of claim 9 , wherein the mobile endpoint device comprises a mobile phone.
13. The tangible computer-readable storage medium of claim 12 , wherein the user is a subscriber of a network service provided by a service provider of the network.
14. The tangible computer-readable storage medium of claim 13 , wherein the authenticating is performed by the service provider.
15. The tangible computer-readable storage medium of claim 9 , wherein the authenticating is performed by a third party.
16. The tangible computer-readable storage medium of claim 9 , wherein the mobile endpoint device uses infrared radiation for illumination of a retina of the user in capturing the first retinal image.
17. A method for authenticating a first retinal image, comprising:
receiving, by a processor of a credit card company, a request for authentication from a mobile endpoint device of a user over a network, wherein the request comprises the first retinal image of the user captured using an adaptive liquid lens and a second lens of the mobile endpoint device, wherein the first retinal image of the user comprises a near-field image;
obtaining, by the processor, a second retinal image of the user, wherein the second retinal image is a stored retinal image of the user;
authenticating, by the processor, the first retinal image against the second retinal image; and
forwarding, by the processor, authentication information of the user to a third party merchant.
18. The method of claim 17 , further comprising:
providing, by the processor, a positive response to the mobile endpoint device when the request for authentication is successful; and
providing, by the processor, a negative response to the mobile endpoint device when the request for authentication has failed.
19. The method of claim 17 , wherein the user is a subscriber of a network service provided by a service provider of the network.
20. The method of claim 19 , wherein the authenticating is performed by the service provider.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/635,282 US9977885B2 (en) | 2009-10-23 | 2015-03-02 | Method and apparatus for eye-scan authentication using a liquid lens |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/605,180 US8233673B2 (en) | 2009-10-23 | 2009-10-23 | Method and apparatus for eye-scan authentication using a liquid lens |
US13/561,969 US8369584B2 (en) | 2009-10-23 | 2012-07-30 | Method and apparatus for eye-scan authentication using a liquid lens |
US13/691,433 US8750577B2 (en) | 2009-10-23 | 2012-11-30 | Method and apparatus for eye-scan authentication using a liquid lens |
US14/283,061 US8971590B2 (en) | 2009-10-23 | 2014-05-20 | Method and apparatus for eye-scan authentication using a liquid lens |
US14/635,282 US9977885B2 (en) | 2009-10-23 | 2015-03-02 | Method and apparatus for eye-scan authentication using a liquid lens |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/283,061 Continuation US8971590B2 (en) | 2009-10-23 | 2014-05-20 | Method and apparatus for eye-scan authentication using a liquid lens |
Publications (2)
Publication Number | Publication Date |
---|---|
US20150178488A1 true US20150178488A1 (en) | 2015-06-25 |
US9977885B2 US9977885B2 (en) | 2018-05-22 |
Family
ID=43425861
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/605,180 Active 2030-10-16 US8233673B2 (en) | 2009-10-23 | 2009-10-23 | Method and apparatus for eye-scan authentication using a liquid lens |
US13/561,969 Active US8369584B2 (en) | 2009-10-23 | 2012-07-30 | Method and apparatus for eye-scan authentication using a liquid lens |
US13/691,433 Active US8750577B2 (en) | 2009-10-23 | 2012-11-30 | Method and apparatus for eye-scan authentication using a liquid lens |
US14/283,061 Expired - Fee Related US8971590B2 (en) | 2009-10-23 | 2014-05-20 | Method and apparatus for eye-scan authentication using a liquid lens |
US14/635,282 Active 2030-12-09 US9977885B2 (en) | 2009-10-23 | 2015-03-02 | Method and apparatus for eye-scan authentication using a liquid lens |
Family Applications Before (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/605,180 Active 2030-10-16 US8233673B2 (en) | 2009-10-23 | 2009-10-23 | Method and apparatus for eye-scan authentication using a liquid lens |
US13/561,969 Active US8369584B2 (en) | 2009-10-23 | 2012-07-30 | Method and apparatus for eye-scan authentication using a liquid lens |
US13/691,433 Active US8750577B2 (en) | 2009-10-23 | 2012-11-30 | Method and apparatus for eye-scan authentication using a liquid lens |
US14/283,061 Expired - Fee Related US8971590B2 (en) | 2009-10-23 | 2014-05-20 | Method and apparatus for eye-scan authentication using a liquid lens |
Country Status (5)
Country | Link |
---|---|
US (5) | US8233673B2 (en) |
EP (1) | EP2491538A1 (en) |
JP (2) | JP2013508864A (en) |
KR (1) | KR20120099052A (en) |
WO (1) | WO2011050026A1 (en) |
Families Citing this family (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8811914B2 (en) * | 2009-10-22 | 2014-08-19 | At&T Intellectual Property I, L.P. | Method and apparatus for dynamically processing an electromagnetic beam |
US8233673B2 (en) | 2009-10-23 | 2012-07-31 | At&T Intellectual Property I, L.P. | Method and apparatus for eye-scan authentication using a liquid lens |
US8417121B2 (en) | 2010-05-28 | 2013-04-09 | At&T Intellectual Property I, L.P. | Method and apparatus for providing communication using a terahertz link |
US8515294B2 (en) | 2010-10-20 | 2013-08-20 | At&T Intellectual Property I, L.P. | Method and apparatus for providing beam steering of terahertz electromagnetic waves |
US9317860B2 (en) | 2011-03-08 | 2016-04-19 | Bank Of America Corporation | Collective network of augmented reality users |
US9224166B2 (en) | 2011-03-08 | 2015-12-29 | Bank Of America Corporation | Retrieving product information from embedded sensors via mobile device video analysis |
US9317835B2 (en) | 2011-03-08 | 2016-04-19 | Bank Of America Corporation | Populating budgets and/or wish lists using real-time video image analysis |
US8873807B2 (en) | 2011-03-08 | 2014-10-28 | Bank Of America Corporation | Vehicle recognition |
US8721337B2 (en) | 2011-03-08 | 2014-05-13 | Bank Of America Corporation | Real-time video image analysis for providing virtual landscaping |
US8922657B2 (en) * | 2011-03-08 | 2014-12-30 | Bank Of America Corporation | Real-time video image analysis for providing security |
US8438110B2 (en) * | 2011-03-08 | 2013-05-07 | Bank Of America Corporation | Conducting financial transactions based on identification of individuals in an augmented reality environment |
US9773285B2 (en) | 2011-03-08 | 2017-09-26 | Bank Of America Corporation | Providing data associated with relationships between individuals and images |
US8718612B2 (en) | 2011-03-08 | 2014-05-06 | Bank Of American Corporation | Real-time analysis involving real estate listings |
US8589298B2 (en) * | 2011-07-21 | 2013-11-19 | Bank Of America Corporation | Multi-stage filtering for fraud detection with velocity filters |
US8447674B2 (en) * | 2011-07-21 | 2013-05-21 | Bank Of America Corporation | Multi-stage filtering for fraud detection with customer history filters |
US8606712B2 (en) * | 2011-07-21 | 2013-12-10 | Bank Of America Corporation | Multi-stage filtering for fraud detection with account event data filters |
KR102362726B1 (en) * | 2014-11-14 | 2022-02-15 | 엘지이노텍 주식회사 | Iris recognition camera and portable termianl including the same and iris recognition method using the iris recognition camera |
US10037676B1 (en) | 2015-10-01 | 2018-07-31 | David Scharf | Remote cognitive impairment screening and location verification system and method |
CN108605101B (en) | 2016-01-25 | 2021-07-06 | 肖特玻璃科技(苏州)有限公司 | System for optical detection of parameters |
US10379709B2 (en) * | 2016-04-08 | 2019-08-13 | Paypal, Inc. | Electronically analyzing user activity on a graphical user interface |
US9726896B2 (en) * | 2016-04-21 | 2017-08-08 | Maximilian Ralph Peter von und zu Liechtenstein | Virtual monitor display technique for augmented reality environments |
US10178101B2 (en) | 2016-06-08 | 2019-01-08 | Bank Of America Corporation | System for creation of alternative path to resource acquisition |
US10129126B2 (en) | 2016-06-08 | 2018-11-13 | Bank Of America Corporation | System for predictive usage of resources |
US10291487B2 (en) | 2016-06-08 | 2019-05-14 | Bank Of America Corporation | System for predictive acquisition and use of resources |
US10581988B2 (en) | 2016-06-08 | 2020-03-03 | Bank Of America Corporation | System for predictive use of resources |
US10433196B2 (en) | 2016-06-08 | 2019-10-01 | Bank Of America Corporation | System for tracking resource allocation/usage |
DE102018212685B4 (en) * | 2018-07-30 | 2023-06-22 | Robert Bosch Gmbh | Optical particle sensor device and corresponding particle measurement method |
CN112394507A (en) * | 2020-10-21 | 2021-02-23 | 天津中科智能识别产业技术研究院有限公司 | Iris imaging depth of field extension method based on liquid lens |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080319801A1 (en) * | 2006-05-27 | 2008-12-25 | Wilson Jeffrey R | Warranted Retail Transaction |
US8645280B2 (en) * | 2010-06-04 | 2014-02-04 | Craig McKenzie | Electronic credit card with fraud protection |
Family Cites Families (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5359669A (en) * | 1992-04-13 | 1994-10-25 | Motorola, Inc. | Remote retinal scan identifier |
US7768380B2 (en) * | 1994-05-09 | 2010-08-03 | Automotive Technologies International, Inc. | Security system control for monitoring vehicular compartments |
US7431456B2 (en) | 1996-10-31 | 2008-10-07 | Nidek Co., Ltd. | Fundus camera |
JP3630908B2 (en) * | 1997-02-28 | 2005-03-23 | 株式会社ニデック | Handheld fundus camera |
JPH1196252A (en) * | 1997-09-17 | 1999-04-09 | Hitachi Ltd | Electronic money transaction system using multimedia portable terminal |
JP4062461B2 (en) | 1998-08-20 | 2008-03-19 | 日本開閉器工業株式会社 | Dust cover for switch |
US6377699B1 (en) | 1998-11-25 | 2002-04-23 | Iridian Technologies, Inc. | Iris imaging telephone security module and method |
JP2002150274A (en) | 2000-11-07 | 2002-05-24 | Masayuki Makita | Portable radio terminal and authentication method using the portable radio terminal |
JP3978322B2 (en) * | 2001-08-30 | 2007-09-19 | 富士通サポートアンドサービス株式会社 | Authentication system and information processing apparatus |
US7197248B1 (en) | 2002-07-29 | 2007-03-27 | United States Of America As Represented By The Secretary Of The Army | Adaptive correction of wave-front phase distortions in a free-space laser communication system and method |
EP1599934A2 (en) | 2003-03-03 | 2005-11-30 | K.U. Leuven Research and Development | Generation of electric oscillations by continuous, supercooled superconductors with an applied voltage |
KR101108966B1 (en) | 2003-07-11 | 2012-01-31 | 블루 뷰 테크놀로지스, 인크. | SYSTEMS AND METHODS IMPLEMENTING FREQUENCY-STEERED ACOUSTIC ARRAYS FOR 2D and 3D IMAGING |
US20050195103A1 (en) | 2004-01-13 | 2005-09-08 | Davis Dennis W. | Phased arrays exploiting geometry phase and methods of creating such arrays |
JP2005204017A (en) * | 2004-01-15 | 2005-07-28 | Oki Electric Ind Co Ltd | Portable information terminal |
US7015865B2 (en) | 2004-03-10 | 2006-03-21 | Lucent Technologies Inc. | Media with controllable refractive properties |
WO2006023195A2 (en) | 2004-07-23 | 2006-03-02 | The Regents Of The University Of California | Metamaterials |
US7173565B2 (en) | 2004-07-30 | 2007-02-06 | Hrl Laboratories, Llc | Tunable frequency selective surface |
US7777594B2 (en) | 2004-08-09 | 2010-08-17 | Ontario Centres Of Excellence Inc. | Negative-refraction metamaterials using continuous metallic grids over ground for controlling and guiding electromagnetic radiation |
US7205941B2 (en) | 2004-08-30 | 2007-04-17 | Hewlett-Packard Development Company, L.P. | Composite material with powered resonant cells |
JP4654003B2 (en) | 2004-11-09 | 2011-03-16 | 株式会社栃木ニコン | measuring device |
US7405866B2 (en) | 2004-11-19 | 2008-07-29 | Hewlett-Packard Development Company, L.P. | Composite material with controllable resonant cells |
US7221931B2 (en) * | 2005-04-22 | 2007-05-22 | Lucent Technologies Inc. | Network support for electronic passports |
GB0511209D0 (en) | 2005-06-02 | 2005-07-06 | Thru Vision Ltd | Scanning method and apparatus |
WO2007008845A2 (en) | 2005-07-08 | 2007-01-18 | Wms Gaming Inc. | Fault tolerant gaming systems |
US7657182B2 (en) | 2005-08-04 | 2010-02-02 | Panasonic Corporation | Liquid lens optical transmitter system |
US7864394B1 (en) | 2005-08-31 | 2011-01-04 | The United States Of America As Represented By The Secretary Of The Navy | Dynamically variable metamaterial lens and method |
US7525711B1 (en) | 2005-08-31 | 2009-04-28 | The United States Of America As Represented By The Secretary Of The Navy | Actively tunable electromagnetic metamaterial |
US8207907B2 (en) | 2006-02-16 | 2012-06-26 | The Invention Science Fund I Llc | Variable metamaterial apparatus |
US20070164842A1 (en) | 2006-01-19 | 2007-07-19 | Lumera Corporation | Electro-Optic Radiometer to Detect Radiation |
US7791814B2 (en) * | 2006-02-01 | 2010-09-07 | Varioptic | Optical electrowetting device |
EP1816491A1 (en) | 2006-02-01 | 2007-08-08 | Varioptic | Electrowetting device |
KR100678096B1 (en) | 2006-02-14 | 2007-02-02 | 삼성전자주식회사 | The method of controlling handoff on optical distributed network system using multiple input multiple output scheme |
JP2009535942A (en) | 2006-04-27 | 2009-10-01 | レイスパン コーポレーション | Antennas, devices, and systems based on metamaterial structures |
JP4894366B2 (en) * | 2006-06-14 | 2012-03-14 | 株式会社ニコン | Blur correction device and optical apparatus |
JP2008039539A (en) | 2006-08-04 | 2008-02-21 | Shimadzu Corp | Light scattering detector |
US7492329B2 (en) | 2006-10-12 | 2009-02-17 | Hewlett-Packard Development Company, L.P. | Composite material with chirped resonant cells |
WO2008121159A2 (en) | 2006-10-19 | 2008-10-09 | Los Alamos National Security Llc | Active terahertz metamaterial devices |
US8131123B2 (en) | 2006-11-07 | 2012-03-06 | Olympus Corporation | Beam steering element and associated methods for manifold fiberoptic switches and monitoring |
US20080147409A1 (en) * | 2006-12-18 | 2008-06-19 | Robert Taormina | System, apparatus and method for providing global communications |
US7858923B2 (en) | 2006-12-26 | 2010-12-28 | Canon Kabushiki Kaisha | Light beam scanning apparatus and image forming apparatus provided with the same |
US20100289715A1 (en) | 2007-01-30 | 2010-11-18 | Duke University | Metamaterial particles having active electronic components and related methods |
US8309930B2 (en) | 2007-03-05 | 2012-11-13 | University Of Virginia Patent Foundation | Method of local electro-magnetic field enhancement of terahertz (THz) radiation in sub- wavelength regions and improved coupling of radiation to materials through the use of the discontinuity edge effect |
WO2008115881A1 (en) | 2007-03-16 | 2008-09-25 | Rayspan Corporation | Metamaterial antenna arrays with radiation pattern shaping and beam switching |
US20080245872A1 (en) * | 2007-04-05 | 2008-10-09 | Good Timothy A | Barcode scanner/reader having constantly varying focal distance |
US7724180B2 (en) | 2007-05-04 | 2010-05-25 | Toyota Motor Corporation | Radar system with an active lens for adjustable field of view |
JP4636340B2 (en) * | 2007-07-10 | 2011-02-23 | ソニー株式会社 | Biological imaging device |
JP2009042675A (en) * | 2007-08-10 | 2009-02-26 | Citizen Electronics Co Ltd | Camera with liquid crystal lens or liquid lens |
US7946493B2 (en) | 2007-09-27 | 2011-05-24 | Hand Held Products, Inc. | Wireless bar code transaction device |
US8200736B2 (en) * | 2007-12-24 | 2012-06-12 | Qualcomm Incorporated | Virtual SIM card for mobile handsets |
JP2009186596A (en) * | 2008-02-04 | 2009-08-20 | Sony Corp | Imaging lens system and imaging apparatus using the same |
US8674792B2 (en) | 2008-02-07 | 2014-03-18 | Toyota Motor Engineering & Manufacturing North America, Inc. | Tunable metamaterials |
CA2717472A1 (en) | 2008-03-10 | 2009-09-17 | Koninklijke Philips Electronics N.V. | Method and apparatus for communication in an illumination system using a liquid lens |
US8374566B2 (en) | 2008-04-04 | 2013-02-12 | Nxp B.V. | Integrated wideband RF tracking filter for RF front end with parallel band switched tuned amplifiers |
WO2009137263A2 (en) | 2008-04-18 | 2009-11-12 | New Jersey Institute Of Technology | Ultra-miniaturized thz communication device and system |
KR101125721B1 (en) | 2008-05-27 | 2012-03-28 | 홀린워스 펀드, 엘.엘.씨. | RF power amplifiers with linearization |
US7848026B2 (en) | 2008-08-27 | 2010-12-07 | Alcatel-Lucent Usa Inc. | Chirped metamaterials |
US20100086750A1 (en) | 2008-10-08 | 2010-04-08 | Lucent Technologies Inc. | Conductive polymer metamaterials |
US20100151865A1 (en) | 2008-12-11 | 2010-06-17 | Sony Ericsson Mobile Communications Ab | Interference Reduction in High-Speed Wireless Data Networks |
US20100166430A1 (en) | 2008-12-26 | 2010-07-01 | Steve Alten | Broadcast optical interconnect using a MEMS mirror |
US8149485B2 (en) | 2008-12-29 | 2012-04-03 | Hewlett-Packard Development Company, L.P. | Dynamically reconfigurable holograms with electronically erasable programmable intermediate layers |
US8213022B1 (en) | 2009-03-04 | 2012-07-03 | University Of Central Florida Research Foundation, Inc. | Spatially smart optical sensing and scanning |
US8477408B2 (en) | 2009-04-02 | 2013-07-02 | Hewlett-Packard Development Company, L.P. | Electronically reconfigurable planar crossbar array optical elements |
US8451189B1 (en) | 2009-04-15 | 2013-05-28 | Herbert U. Fluhler | Ultra-wide band (UWB) artificial magnetic conductor (AMC) metamaterials for electrically thin antennas and arrays |
US8811914B2 (en) | 2009-10-22 | 2014-08-19 | At&T Intellectual Property I, L.P. | Method and apparatus for dynamically processing an electromagnetic beam |
US8233673B2 (en) | 2009-10-23 | 2012-07-31 | At&T Intellectual Property I, L.P. | Method and apparatus for eye-scan authentication using a liquid lens |
US8417121B2 (en) | 2010-05-28 | 2013-04-09 | At&T Intellectual Property I, L.P. | Method and apparatus for providing communication using a terahertz link |
US8515294B2 (en) | 2010-10-20 | 2013-08-20 | At&T Intellectual Property I, L.P. | Method and apparatus for providing beam steering of terahertz electromagnetic waves |
-
2009
- 2009-10-23 US US12/605,180 patent/US8233673B2/en active Active
-
2010
- 2010-10-20 EP EP10779093A patent/EP2491538A1/en not_active Withdrawn
- 2010-10-20 JP JP2012535325A patent/JP2013508864A/en active Pending
- 2010-10-20 KR KR1020127013024A patent/KR20120099052A/en not_active Application Discontinuation
- 2010-10-20 WO PCT/US2010/053320 patent/WO2011050026A1/en active Application Filing
-
2012
- 2012-07-30 US US13/561,969 patent/US8369584B2/en active Active
- 2012-11-30 US US13/691,433 patent/US8750577B2/en active Active
-
2014
- 2014-05-20 US US14/283,061 patent/US8971590B2/en not_active Expired - Fee Related
-
2015
- 2015-03-02 US US14/635,282 patent/US9977885B2/en active Active
- 2015-04-02 JP JP2015075812A patent/JP6121470B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080319801A1 (en) * | 2006-05-27 | 2008-12-25 | Wilson Jeffrey R | Warranted Retail Transaction |
US8645280B2 (en) * | 2010-06-04 | 2014-02-04 | Craig McKenzie | Electronic credit card with fraud protection |
Also Published As
Publication number | Publication date |
---|---|
KR20120099052A (en) | 2012-09-06 |
EP2491538A1 (en) | 2012-08-29 |
JP2013508864A (en) | 2013-03-07 |
US8750577B2 (en) | 2014-06-10 |
US8233673B2 (en) | 2012-07-31 |
JP2015181002A (en) | 2015-10-15 |
US20140254889A1 (en) | 2014-09-11 |
US20130089242A1 (en) | 2013-04-11 |
US8971590B2 (en) | 2015-03-03 |
US20120294494A1 (en) | 2012-11-22 |
US9977885B2 (en) | 2018-05-22 |
US20110096960A1 (en) | 2011-04-28 |
US8369584B2 (en) | 2013-02-05 |
JP6121470B2 (en) | 2017-04-26 |
WO2011050026A1 (en) | 2011-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9977885B2 (en) | Method and apparatus for eye-scan authentication using a liquid lens | |
US20240127235A1 (en) | Extending a secure key storage for transaction confirmation and cryptocurrency | |
US10326761B2 (en) | Web-based user authentication techniques and applications | |
US10769635B2 (en) | Authentication techniques including speech and/or lip movement analysis | |
US10091195B2 (en) | System and method for bootstrapping a user binding | |
US10637853B2 (en) | Authentication techniques including speech and/or lip movement analysis | |
US9781105B2 (en) | Fallback identity authentication techniques | |
US6505193B1 (en) | System and method of fast biometric database searching using digital certificates | |
US8595804B2 (en) | System and method for device security with a plurality of authentication modes | |
US8364131B2 (en) | Method and apparatus for providing caller recognition based on biometric data and biometric mobile device address book | |
JP5579915B2 (en) | Gripping feature learning authentication system and gripping feature learning authentication method | |
WO2003088016A1 (en) | Information device | |
Vapen et al. | 2-clickauth optical challenge-response authentication | |
US20060238607A1 (en) | Network support for electronic passports | |
US12126613B2 (en) | System and method for pre-registration of FIDO authenticators | |
CN104903875B (en) | Communicator and image retransmission method | |
KR20040048115A (en) | Apparatus and method for transmitting/receiving multi-biological information for authentication in mobile communication network | |
US20160028724A1 (en) | Identity Reputation | |
WO2015108823A1 (en) | Identity reputation | |
Sun et al. | Let Your Camera See for You: A Novel Two-Factor Authentication Method against Real-Time Phishing Attacks | |
FR3106949A1 (en) | Process for verifying the human character of a user for access to a service | |
JP2005148819A (en) | Log-in authenticating method and program | |
JP2006121342A (en) | Radio communication terminal and encryption communication method | |
Karatzouni et al. | Device versus network-centric authentication models for mobile devices–operational and perceptual trade-offs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: AT&T INTELLECTUAL PROPERTY I, L.P., GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRITZ, DAVID MICHAEL;MILLER, ROBERT RAYMOND, II;REEL/FRAME:035065/0967 Effective date: 20100929 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |